News & Analysis as of

Third-Party Cybersecurity Supply Chain

Integreon

DORA Compliance Part 1: Proactively Meeting DORA Supply Chain Resilience Obligations

Integreon on

Introduction to DORA and its Implications - As of Jan.17, 2025, the European Union’s Digital Operational Resilience Act (DORA) became enforceable. This new regulatory framework significantly impacts financial institutions and...more

Foley & Lardner LLP

President Biden Issues Second Cybersecurity Executive Order

Foley & Lardner LLP on

In light of recent cyberattacks targeting the federal government and United States supply chains, President Biden’s administration has released an Executive Order (the “Order”) in an attempt to modernize and enhance the...more

Sheppard Mullin Richter & Hampton LLP

Federal Government Outlines New Security and Attestation Requirements for Software

Per Executive Order 14028, Improving the Nation’s Cybersecurity, the Office of Management and Budget (OMB) issued a memorandum on September 14, 2022 requiring federal agencies to only use software from software producers that...more

Foley & Lardner LLP

CMMC 2.0 Brings Increased Flexibility — and Increased Risks — for Contractors

Foley & Lardner LLP on

Defense contractors and their subcontractors and supply chains that have been preparing for the challenge of complying with the Cybersecurity Maturity Model Certification (CMMC) recently received some welcome news from the...more

American Conference Institute (ACI)

[Virtual Event] U.S. Export & Reexport Compliance For Canadian Operations - January 26th - 27th, 9:00 am - 5:00 pm EST

For a whole decade, ACI’s U.S. Export & Reexport Compliance for Canadian Operations conference continues to stand apart as the only practical, comprehensive event of its kind for the export compliance community in Canada. ...more

Perkins Coie

DoD’s Cybersecurity Verification Regime: New Details Emerge Related to Third-Party Auditor Training and Accreditation

Perkins Coie on

A key area of focus in the Department of Defense’s (DoD) gradual rollout of its Cybersecurity Maturity Model Certification (CMMC) is the training and accreditation of third-party assessors that will be responsible for...more

Pillsbury - Global Sourcing Practice

Subcontracting in the Cloud

The rise of cloud computing services and the privacy/security issues involved have been much discussed. But when customers procure cloud-based services, a critical "behind the scenes" issue is often overlooked: is the cloud...more

7 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide